Remove links-resources
article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

What should I be most concerned about – and focus on – in 2024? Rebecca Krauthamer , Co-founder and CPO, QuSecure Krauthamer As new standards for quantum-resilient cryptography come into effect, many government agencies will move toward quantum-readiness. This start-with-the-basics momentum will carry into 2024.

article thumbnail

Stark Industries Solutions: An Iron Hammer in the Cloud

Krebs on Security

Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distributed denial-of-service (DDoS) attacks on government and commercial targets in Ukraine and Europe. Click to enlarge.

Cloud 271
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: NCA’s Data Privacy Week webinars highlight data protection for consumers, businesses

The Last Watchdog

22, 2024 – Today, the National Cybersecurity Alliance (NCA) , announced the program for its third annual Data Privacy Week campaign, which will take place from January 22nd to January 27th. “Knowing how to safeguard your personal information has never been more important than it is today. Give Data Brokers the Slip!

article thumbnail

The Week in Cyber Security and Data Privacy: 12 – 18 February 2024

IT Governance

In January 2024, it identified more potential victims, and has now written to inform them that their personal data may have been compromised in the incident. The total number of victims is now more than 5 million.

article thumbnail

Catches of the Month: Phishing Scams for November 2023

IT Governance

The attacks began with emails sent to hotel employees, which manipulated them into clicking a malicious link that downloaded infostealer malware on to hotel systems. However, generative AI eliminates these basic errors, making it easier for attackers – even those with limited resources – to create convincing emails.

article thumbnail

Expert Insight: Cliff Martin

IT Governance

Before that, he taught computer systems and network technologies in further and higher education. For more details on the first core requirement, risk management, see our interview with Andrew Pattison, head of GRC [governance, risk and compliance] consultancy Europe, from two weeks ago. Ultimately, resources are – of course – limited.

Risk 52
article thumbnail

The Week in Cyber Security and Data Privacy: 15 – 21 April 2024

IT Governance

million records from World-Check, a screening database used to screen potential customers for links to illegal activity and government sanctions. Mobile Guardian, which is used to help parents manage their children’s device usage, was hacked on 19 April, according to the Singaporean Ministry of Education.